PME - Programme FORCE (cybersécurité) de l'UQTR destiné aux PME
03 septembre 2025
Parce que... c'est l'épisode 0x625!
Teknik - Résilience OT
12 juin 2025
Parce que... c'est l'épisode 0x624!
Actu - 1er septembre 2025
01 septembre 2025
Parce que... c'est l'épisode 0x623!
Parce que… c’est l’épisode 0x623!
Préambule
Bon… je saute à l’eau et je repars un podcast sur l’actualité en mode seul. Ce que je n’avais pas fait depuis vraiment longtemps. J’ai été excessif sur le volume de nouvelles, ne m’étant pas bien organisé. Je m’améliorerai avec la pratique… car, paraît-il, ça ne se perd pas, comme le “bécicle”. Aussi, et probablement le plus audible, j’ai eu un glitch à l’enregistrement. Comme quoi j’ai vraiment perdu la main. Pour l’aspect technique, j’ai oublié de retirer un filtre lors de l’enregistrement, ce qui fait que la bande originale est “instable”.
Shameless plug
- 10 et 11 septembre 2025 - GoSec 2025
- Code rabais de 15% - GSPOL25
- 13 septembre 2025 - BSides Montreal 2025
- 12 au 17 octobre 2025 - Objective by the sea v8
- 14 et 15 octobre 2025 - ATT&CKcon 6.0
- 14 et 15 octobre 2025 - Forum inCyber Canada
- Code rabais de 30% - CA25KDUX92
- 10 au 12 novembre 2025 - IAQ - Le Rendez-vous IA Québec
- 17 au 20 novembre 2025 - European Cyber Week
- 25 et 26 février 2026 - SéQCure 2026
Description
Notes
- Breach
- Légalise
- AI
- CVE-2025-58062 - OpenMCP Client OS Command Injection Vulnerability
- AI Agents in Browsers Light on Cybersecurity, Bypass Controls
- Anthropic AI Used to Automate Data Extortion Campaign
- Crims laud Claude to plant ransomware and fake IT expertise
- Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors
- Anthropic teases Claude for Chrome: Don’t try this at home
- Researchers flag code that uses AI systems to carry out ransomware attacks
- Securing the AI Revolution: Introducing Cloudflare MCP Server Portals
- Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet
- Helping people when they need it most
- Exclusive: Meta created flirty chatbots of Taylor Swift, other celebrities without permission
- PromptLock - Le premier ransomware à utiliser une IA 100% locale
- Anthropic will start training its AI models on chat transcripts
- The Default Trap: Why Anthropic’s Data Policy Change Matters
- Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware
- New AI attack hides data-theft prompts in downscaled images
- Will Smith’s concert crowds are real, but AI is blurring the lines
- Best Practices for Securing Generative AI with SASE
- ChatGPT, Claude, & Gemini security scanning with Cloudflare CASB
- Hackers Can Exploit Image Scaling in Gemini CLI, Google Assistant to Exfiltrate Sensitive Data
- New Prompt Insertion Attack – OpenAI Account Name Used to Trigger ChatGPT Jailbreaks
- Vulnérabilités
- U.S. CISA adds Citrix Netscaler flaw to its known exploited vulnerabilities catalog
- Docker Desktop bug let containers hop the fence with barely a nudge
- CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
- The Hidden Risk of Consumer Devices in the Hybrid Workforce
- Shadow IT Is Expanding Your Attack Surface. Here’s Proof
- Putin on the code: DoD reportedly relies on utility written by Russia-based Yandex dev
- Microsoft details Storm-0501’s focus on ransomware in the cloud
- Surge in coordinated scans targets Microsoft RDP auth servers
- CVE-2025-7776 - Citrix NetScaler Memory Overflow Denial of Service
- CVE-2025-55526 - n8n-workflows Directory Traversal Vulnerability
- WhatsApp patches vulnerability exploited in zero-day attacks
- Cloud
- Risque
- Privacy
- Smart glasses record people in public. The most online generation is pushing back
- Your Word documents will be saved to the cloud automatically on Windows going forward
- Prepare for the unexpected with emergency access for your Proton Account
- FTC Chair Tells Tech Giants to Hold the Line on Encryption
- The UK May Be Dropping Its Backdoor Mandate
- Defensif
- Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
- BGP’s security problems are notorious. Attempts to fix that are a work in progress
- Who are you again? Infosec experiencing ‘Identity crisis’ amid rising login attacks
- CISA Publish Hunting and Mitigation Guide to Defend Networks from Chinese State-Sponsored Actors
- Offensif
- Threat Actors Abuse Velociraptor Incident Response Tool to Gain Remote Access
- Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems
- Arch Linux Confirms Week-Long DDoS Attack Disrupted its Website, Repository, and Forums
- Hackers Abuse Microsoft Teams to Gain Remote Access on Windows With PowerShell-based Malware
- WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers – Detailed Case Study
- Breaking the Passkey Promise: SquareX Discloses Major Passkey Vulnerability at DEF CON 33
- Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware
- Malicious Android apps with 19M installs removed from Google Play
- Weaponized PuTTY Via Bing Ads Exploit Kerberos and Attack Active Directory Services
- ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners
- PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild
- TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures
Collaborateurs
Crédits
- Montage par Intrasecure inc
- Locaux réels par Intrasecure inc
Tags: cloud, ia, infonuagique, vulnerabilite
Tweet